Featured Articles

RSA is not just a public-key cryptosystem, it’s also the premier security conference in the world. Let’s face it…Rivest, Shamir, and Adleman know how to take a great thing and expand it into a really great thing! The RSA Conference
...

“Funny … but really, what are the names you’re going to market with?” “I’m not presenting these to my customer. They’re too simple.” And that’s when I knew we’d gotten it right. After all, the objective for licensing is to make it simple...

A couple years in the making, the long sought after F5 BIG-IP TMOS: Operations Guide, hence force called the "Manual of Operational Greatness," has arrived! In addition to the great documentation on how to design and deliver traffic...

Since it’s been about 3 months since POODLE, we’re clearly overdue for another major vulnerability in SSL and/or TLS. Fortunately for us, the research team at SmackTLS has released details of the FREAK attack (aka OpenSSL CVE-2015-0204). We...

Peter Nas, Sr. Solution Architect, explains what happens when the many MWC attendees from all over the world arrive in Barcelona and need to connect their mobile devices to a carrier network. Peter does a great job walking us through what happens...

Recent Articles

#chefconf #f5
Chef turns infrastructure into code. It also gives the casual blog writer a terrible temptation to descend into pun-filled drivel. Which would be a shame as the ability to automate and operationalize our infrastructure has never been more relevant. That’s why I’m excited to be attending Chefconf 2015 in Santa Clara. We will be at stand T6 with a number of F5’ers eager to talk...

Scalability is only one of the factors that determine availability. Security and performance play a critical role in achieving the application availability demanded by business and customers alike. Whether the goal is to achieve higher levels or productivity or generate greater customer engagement and revenue the venue today is the same: applications. In any application-focused business...

You’ve heard of the Internet of Things (or Internet of Everything) by now, I’m sure. It’s things like your fridge telling you when you’ve run out of eggs; your shoes telling you how far you’ve travelled; your car keeping you up to date on local traffic so you know which routes to avoid; your house telling you how much water or heating is being used, that kind of thing.
For businesses the...

I've been travelling recently. To places and fields that have limited to no mobile connectivity and this can be a challenge when a challenge arises. Immediately following Mobile World Congress in Barcelona earlier this month, my family embarked on a multi-week European vacation. After spending a couple more days in Spain, we jumped on the rail to Paris for a couple days and then on to Rome...

Managing Thousands of Apps
As enterprises move toward both public and private cloud models, they dramatically shorten the time for an internal application owner to receive new infrastructure they request. Typical enterprises often see server deployment times move from weeks to just a few minutes. This newfound agility enables developers to create and deploy applications at a...

So HTTP/2 is official. That means all the talking is (finally) done and after 16 years of waiting, we've got ourselves a new lingua franca of the web. Okay, maybe that's pushing it, but we do have a new standard to move to that offers some improvements in the areas of resource management and performance that make it definitely worth taking a look at. For example, HTTP/2 is largely...

Do you love security? Are you simultaneously fascinated and petrified by the damage inflicted by a single DDoS attack? Understandably, you want to learn more about DDoS defense solutions. Well, you came to the right place!
F5 will be hosting a webinar on Tuesday, March 31 from 10:00 to 11:00 PDT to discuss this extremely important topic. Join us for this free...